Get valuable insights from threat modeling experts.

Stay updated with high quality educational material every month.
No ads, no spam. Just pure learning.

Join 2000+ companies who learn about threat modeling every month!

Level-up your security skills right from your Inbox

Our mission is simple: make threat modeling practical and accessible for everyone, aiming to build more secure products. 

In our free monthly newsletter, Seba Deleersnyder guides you through what is happening in the threat modeling community — and why it matters for your professional career: 

Guest insights from industry practitioners 

Previous editions include guest content from Adam Shostack, Tony UV, Fraser ‘zeroXten‘ Scott, Izar Tarandach, and many more

Exclusive threat modeling content

Such as handy tips & tricks, practical frameworks and ready-to-go threat models.

Curated must-read articles

Concerned about missing opportunities and competitive advantages in the midst of the current wave of digitization and automation?

Guest insights from industry practitioners ​

Previous editions include guest content from Adam Shostack, Tony UV, Fraser ‘zeroXten‘ Scott, Izar Tarandach, and many more

Exclusive threat modeling content ​

Such as handy tips & tricks, practical frameworks and ready-to-go threat models.

Curated must-read articles

Concerned about missing opportunities and competitive advantages in the midst of the current wave of digitization and automation?

Elevate your security game
without leaving your inbox

A quick content sneak peak...

Risk patterns

Risk Patterns: Your secret weapon for smarter threat modeling

Discover how risk patterns streamline threat modeling, cut exposure, and boost security. Learn proven strategies and see how to take action today.

Blog 10 scaled

Level Up Your Threat Models: Data Flow Diagram Template for Miro

Enhance your threat modeling with Miro’s Data Flow Diagram Template. Create representations of your systems with trust boundaries to visualize your data flows and strengthen your security strategy.

Blog 33 scaled

Threat Modeling in an ICS environment

Threat modeling is as a discipline that fits really well in ICS and OT environments, to design and secure connected systems in a way that is aligned with typical operational technology challenges.

Blog 34 scaled

Threat Modeling in 4 practical steps

Want to build more secure systems from the start? Our blog breaks down threat modeling into four clear, actionable steps to help your team identify and mitigate risks early.

A quick content sneak peak...​

2000+ companies trust the Threat Modeling Insider
for the latest insights.

Elevate your security game
without leaving your inbox

Still not convinced? Check our previous editions.

Threat Modeling Insider Edition #43
  • Guest Article Simple Threat Modeling: Four Principles to Accelerate Security at Scale
    Written by Dave Soldera
  • Toreon Blog How to Choose a Threat Modeling Training That Actually Works
    Written by Sebastien Deleersnyder
  • Curated Content Securing AI with Secure by Design Practices
  • Curated Content Evaluating potential cybersecurity threats of advanced AI
  • Tips & Tricks Data-flow diagrams explained
  • Training Update An update on our upcoming training sessions
Threat Modeling Insider Edition #42
  • Guest Article PLOT4AI 2.0: A Needed Update in the Changing AI Landscape
    Written by Isabel Barberá
  • Toreon Blog Threat Modeling: A Strategic, Cost-Effective Path to CRA Compliance and Security by Design
    Written by Sebastien Deleersnyder
  • Curated Content The Evolution of Threat Modeling: From Military Strategy to Cybersecurity Engineering
  • Curated Content Deep Backdoors in Deep Reinforcement Learning Agents
  • Tips & Tricks OWASP Cornucopia​
  • Training Update An update on our upcoming training sessions
Threat Modeling Insider Edition #41
  • Guest Article Using GenAI in Threat Modeling and Application Security
    Written by Dinis Cruz
  • Toreon Blog Making Threat Modeling Accessible: Top 10 Tools and Resources for Practitioners
    Written by Sebastien Deleersnyder
  • Curated Content New OWASP Agentic AI – Threats and Mitigations Guide
  • Curated Content AI Threat Mind Map
  • Tips & Tricks Drawing DFDs
  • Training Update An update on our upcoming training sessions

Still not convinced? Check our previous edition.

Threat Modeling Insider Edition #43
  • Guest Article Simple Threat Modeling: Four Principles to Accelerate Security at Scale
    Written by Dave Soldera
  • Toreon Blog How to Choose a Threat Modeling Training That Actually Works
    Written by Sebastien Deleersnyder
  • Curated Content Securing AI with Secure by Design Practices
  • Curated Content Evaluating potential cybersecurity threats of advanced AI
  • Tips & Tricks Data-flow diagrams explained
  • Training Update An update on our upcoming training sessions

Start typing and press Enter to search

Shopping Cart